HIT Consultant Insightful coverage of healthcare innovation
 

cem

Results 426 - 450 of 613Sort Results By: Published Date | Title | Company Name
Published By: Box     Published Date: Jun 11, 2014
Midsize learning technology company sought to move all files to the cloud for disaster-recovery reasons and to boost employee productivity. Added Box to their existing cloud stack for all employees. Streamlined IT operations; in the process of replacing servers with Box.Technology industry, midsize company, midmarket, global, server replacement, cloud stack, NA, APAC.
Tags : 
box, rosetta stone, midmarket, midsize companies, disaster recovery, server replacement, employee productivity
    
Box
Published By: Workday APAC     Published Date: Dec 11, 2018
SaaS and clourl-enabled ERP systems are the de facto replacement for legacy on-premises ERP systems. Organizations have spent millions on outdated legacy ERP systems over die decades., creating a technical debt that is a nightmare to untangle. Most of these antiquated systems are over 1 0 years old, predate current ecommerce systems, and are not able to work within the digital economy. With the advent of the digital age, businesses need a new digital core that includes Saa5 and cloud-enabled ERP sofrware.
Tags : 
    
Workday APAC
Published By: DigiCert     Published Date: Jun 19, 2018
The Internet of Things (IoT) has rapidly transformed the digital landscape and the world we live in. Intelligent devices and sensors connect smart cars, robotic manufacturing equipment, smart medical equipment, smart cities, industrial control systems, and much more in a way that improves lives and saves businesses billions of dollars. But along with its benefits, rapid IoT growth introduces a new dimension of security vulnerabilities that dramatically escalates the nature and seriousness of cybercrime risks. In addition to traditional confidentiality cyber risks, IoT threats include attacks that can: • Render smart appliances useless • Shut down city power grids • Threaten lives through hacked pacemakers and other medical devices. Such security flaws not only endanger lives, frustrate customers, and disrupt business operations, but they create significant cost and public relations damage for IoT developers and manufacturers.
Tags : 
    
DigiCert
Published By: New Voice Media     Published Date: Apr 27, 2017
By investing in Salesforce you demonstrate a clear interest in your customers and their success. NewVoiceMedia will take that investment to the next level by integrating your communications platform with your customer and prospect data in Salesforce to provide a context rich, superior sales experience.
Tags : 
salesforce, newvoicemedia, sales, service, data
    
New Voice Media
Published By: New Voice Media     Published Date: Apr 27, 2017
By investing in Salesforce you demonstrate a clear interest in your customers and their success. NewVoiceMedia will take that investment to the next level by integrating your communications platform with your customer and prospect data in Salesforce to provide a context rich, superior sales experience.
Tags : 
salesforce, newvoicemedia, sales, service, data
    
New Voice Media
Published By: New Voice Media     Published Date: Apr 27, 2017
By investing in Salesforce you demonstrate a clear interest in your customers and their success. NewVoiceMedia will take that investment to the next level by integrating your communications platform with your customer data in Salesforce to provide personalized, exceptional service.
Tags : 
salesforce, newvoicemedia, sales, service, data
    
New Voice Media
Published By: New Voice Media     Published Date: Jul 24, 2017
Durch eine Investition in Salesforce® beweisen Sie ein klares Interesse an Ihren Kunden und deren Erfolg. NewVoiceMedia sorgt dafür, dass Sie Ihre Investition noch umfassender nutzen können, indem Ihre Kommunikationsplattform mit Ihren Kundendaten in Salesforce® integriert wird. So bieten Sie einen hochwertigen, personalisierten und erstklassigen Service.
Tags : 
salesforce, cloud-kontakt-center-software, • plattform für den internen vertrieb
    
New Voice Media
Published By: New Voice Media     Published Date: Jul 24, 2017
Durch eine Investition in Salesforce® beweisen Sie ein klares Interesse an Ihren Kunden und deren Erfolg. NewVoiceMedia sorgt dafür, dass Sie Ihre Investition noch umfassender nutzen können, indem Ihre Kommunikationsplattform mit Ihren Kundendaten in Salesforce® integriert wird. So bieten Sie einen hochwertigen, personalisierten und erstklassigen Service.
Tags : 
    
New Voice Media
Published By: New Voice Media     Published Date: Jul 24, 2017
Durch eine Investition in Salesforce® beweisen Sie ein klares Interesse an Ihren Kunden und deren Erfolg. NewVoiceMedia sorgt dafür, dass Sie Ihre Investition noch umfassender nutzen können, indem Ihre Kommunikationsplattform mit Ihren Kunden- und Neukundendaten in Salesforce® integriert wird. So bieten Sie einen hochwertigen, mit Kontext angereicherten Verkauf.
Tags : 
salesforce, cloud-kontakt-center-software, • plattform für den internen vertrieb
    
New Voice Media
Published By: IBM     Published Date: Apr 20, 2017
Do Android’s dessert-named updates improve device and data security enough to work for the enterprise? Android has long ruled the consumer market. Now, the latest security advancements from Google and device manufacturers, and support for Android by leading EMM solution providers, are expanding its presence in the enterprise. To help ensure security and compliance with industry standards and government regulations, enterprises need a way to protect and manage the wide range of available devices, versions, and idiosyncrasies of the world’s most popular mobile operating system.
Tags : 
access management, security information, event management, database security, application development, risk management, endpoint management, next generation intrusion protection
    
IBM
Published By: IBM     Published Date: Apr 14, 2017
Any organization wishing to process big data from newly identified data sources, needs to first determine the characteristics of the data and then define the requirements that need to be met to be able to ingest, profile, clean,transform and integrate this data to ready it for analysis. Having done that, it may well be the case that existing tools may not cater for the data variety, data volume and data velocity that these new data sources bring. If this occurs then clearly new technology will need to be considered to meet the needs of the business going forward.
Tags : 
data integration, big data, data sources, business needs, technological advancements, scaling data
    
IBM
Published By: Box     Published Date: Jun 11, 2014
Global energy management giant based in France rolled out Box to 67,000 employees, enabled BYOD, and boosted productivity. Use Box for RFPs, vendor collaboration, executives, sales presentations. Cut server costs by 30%. Energy industry, large company, EMEA, global, sales LOB, BYOD, server replacement.
Tags : 
box, schneider, electric, vendor collaboration, global sales, lob, byod, server replacement
    
Box
Published By: Vonage Business     Published Date: Jan 19, 2018
Take a closer look at what this advancement means for business communications.
Tags : 
business, technology, vonage, smart wan, bandwidth, network
    
Vonage Business
Published By: Lucidworks     Published Date: Feb 12, 2015
Search is all your data, all the time, at scale. Read this white paper today and learn about Lucidworks Fusion, the next-generation search platform built on Apache Solr.
Tags : 
search platform, search query, search technologies, big data, high-volume data, database advancements
    
Lucidworks
Published By: Venafi     Published Date: Mar 26, 2015
Digital certificates have become vital to MDM/EMM, WiFi and VPN access for mobile-device-to-enterprise authentication. But most struggle to identify who has access, audit that access, and terminate access if needed. IT teams need a central certificate security platform that delivers issuance and distribution, visibility, and policy enforcement, as well as the control needed to terminate access.
Tags : 
digital certificates, mdm/emm, wi-fi, vpn, mobile devices, device-to-enterprise authentication, certificate security platform, mobility solutions
    
Venafi
Published By: CA Technologies     Published Date: Mar 06, 2015
L'app non è più semplicemente un metodo per comunicare. Rappresenta il nuovo punto critico di coinvolgimento, il volto dell'azienda, se non addirittura l’elemento chiave della fidelizzazione o meno del cliente.
Tags : 
    
CA Technologies
Published By: Dell     Published Date: Oct 24, 2014
Employees are increasingly using bring-your-own devices (BYOD) to work and accessing corporate IT resources from home. Until now, management of BYOD within IT was piecemeal, with most organizations cob¬bling together solutions that included mobile device management software, unified access suites, security, and hardware. Read this technology brief to learn how Windows Server 2012 R2 takes the guesswork and integration out of BYOD security and administration, providing one point of control and management for IT organizations.
Tags : 
byod, mobile device mangement, secure mobility
    
Dell
Published By: Clearswift     Published Date: Jun 09, 2008
This white paper provides a comprehensive look at spam; from its early days to where we are today in terms of managing the daily threats.  With a strong policy, education and policy enforcement, and a multi-layer content security solution, organizations can address every kind of threat to its networks and its business; regardless of whether the threats are inbound or outbound.
Tags : 
clearswift, network security, internet security, web security
    
Clearswift
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 n’a pas été une année facile pour les DSI / RSSI et 2018 ne semble pas montrer des signes d’embellie. Etant donné le grand nombre de compromissions de données aux conséquences dramatiques (Equifax, Uber, Yahoo pour ne citer que quelques exemples) et compte tenu du renforcement des obligations réglementaires dans le monde, les DSI / RSSI sont contraints de devoir revoir leur approche de la sécurité des données.
Tags : 
    
Infinidat EMEA
Published By: NetIQ     Published Date: Dec 23, 2010
The paper also provides an overview of the HITECH Act, which addresses the privacy and security concerns associated with the electronic transmission of health information, in part, through several provisions that strengthen the civil and criminal enforcement of the HIPAA rules.
Tags : 
netiq, security, hipaa compliance, protected data
    
NetIQ
Published By: Preempt     Published Date: Nov 02, 2018
Enterprises and the threats that target them have all fundamentally evolved over the past decade. In response, the security industry has generated an enormous amount of point solutions and technologies to try and keep pace. However, for all of this innovation and change, the underlying enforcement architecture has remained largely unchanged. A new modern approach to preempting threats is required. One that augments the existing architecture instead of replaces it. This new approach brings full enterprise and business context to real-time enforcement decisions. Identity, behavior, devices, anomalies, and risk all play a real-time role. Just as importantly, enforcement and access options can be graded based on the risk to the business, and policies can actively seek out and adapt to new information.
Tags : 
    
Preempt
Published By: Mimecast     Published Date: May 11, 2009
Securing your email is a complex process that takes time and uses resources that can be better deployed elsewhere in your business. Moving on-premise email security into the cloud not only saves time and money, but also reduces risk and takes advantages of economies of scale to deliver an effective, dedicated security platform that unshackles users and releases the potential of your mail.
Tags : 
mimecast, saas, software as a service, software as a service, malware, antispam, policy enforcement, email archive
    
Mimecast
Published By: Delphix     Published Date: May 28, 2015
A new generation of tools is bringing agility to components of IT operations . Learn how recent advancements in agile data management, data virtualization, and data masking are combining to help companies achieve previously unachievable breakthroughs in IT security and risk management. Starting with a technical dive into data masking and the key concepts surrounding “virtual data”, this eBook also leverages exhaustive industry research and company surveys to translate the business value associated with these solutions.
Tags : 
    
Delphix
Published By: Avaya     Published Date: Dec 18, 2013
Seven Trends Driving Effectiveness in the Contact Center
Tags : 
avaya, contact center, mobile, social media, customer service, cem, customer experience management
    
Avaya
Published By: OpenDNS     Published Date: Mar 31, 2015
"Security solutions are getting more sophisticated, but so are the advanced threats that you are up against. While businesses have the power to gather more intelligence from more sources, it can be difficult to share that intelligence and apply enforcement on any device, anywhere, anytime."
Tags : 
    
OpenDNS
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.